Comparison Overview

Rawabi Archer Company Ltd.

VS

Amec Foster Wheeler

Rawabi Archer Company Ltd.

Al Khobar, 31952, SA
Last Update: 2026-03-23

Rawabi Archer is a leading provider of oilfield services for offshore and onshore drilling, and workover applications. With over 15 years of expertise in driving drilling efficiency and well integrity, we provide a comprehensive suite of services, and advanced technologies designed to enhance operational safety and performance. Whether completion, intervention or contingency operations, Rawabi Archer has the experience and equipment to get work done both safely and efficiently. Our experience, combined with our ability to provide custom engineering support, allows Rawabi Archer to deliver industry-leading services that consistently set the standard.

NAICS: 211
NAICS Definition: Oil and Gas Extraction
Employees: 36
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Amec Foster Wheeler

15 Justice Mill Lane, Aberdeen, AB11 6EQ, GB
Last Update: 2026-04-01
Between 750 and 799

Wood Group has combined with Amec Foster Wheeler to form a new global leader in the delivery of project, engineering and technical services to energy and industrial markets. To find out more about Wood visit our new website at www.woodplc.com For all the latest updates and job news follow Wood on LinkedIn https://www.linkedin.com/company/wood-group/

NAICS: 211
NAICS Definition: Oil and Gas Extraction
Employees: 14,287
Subsidiaries: 2
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/rawabi-archer-company-ltd.jpeg
Rawabi Archer Company Ltd.
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/amecfw.jpeg
Amec Foster Wheeler
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Rawabi Archer Company Ltd.
100%
Compliance Rate
0/4 Standards Verified
Amec Foster Wheeler
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Oil and Gas Industry Average (This Year)

No incidents recorded for Rawabi Archer Company Ltd. in 2026.

Incidents vs Oil and Gas Industry Average (This Year)

No incidents recorded for Amec Foster Wheeler in 2026.

Incident History — Rawabi Archer Company Ltd. (X = Date, Y = Severity)

Rawabi Archer Company Ltd. cyber incidents detection timeline including parent company and subsidiaries

Incident History — Amec Foster Wheeler (X = Date, Y = Severity)

Amec Foster Wheeler cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/rawabi-archer-company-ltd.jpeg
Rawabi Archer Company Ltd.
Incidents

No Incident

https://images.rankiteo.com/companyimages/amecfw.jpeg
Amec Foster Wheeler
Incidents

No Incident

FAQ

Amec Foster Wheeler company demonstrates a stronger AI Cybersecurity Score compared to Rawabi Archer Company Ltd. company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, Amec Foster Wheeler company has disclosed a higher number of cyber incidents compared to Rawabi Archer Company Ltd. company.

In the current year, Amec Foster Wheeler company and Rawabi Archer Company Ltd. company have not reported any cyber incidents.

Neither Amec Foster Wheeler company nor Rawabi Archer Company Ltd. company has reported experiencing a ransomware attack publicly.

Neither Amec Foster Wheeler company nor Rawabi Archer Company Ltd. company has reported experiencing a data breach publicly.

Neither Amec Foster Wheeler company nor Rawabi Archer Company Ltd. company has reported experiencing targeted cyberattacks publicly.

Neither Rawabi Archer Company Ltd. company nor Amec Foster Wheeler company has reported experiencing or disclosing vulnerabilities publicly.

Neither Rawabi Archer Company Ltd. nor Amec Foster Wheeler holds any compliance certifications.

Neither company holds any compliance certifications.

Amec Foster Wheeler company has more subsidiaries worldwide compared to Rawabi Archer Company Ltd. company.

Amec Foster Wheeler company employs more people globally than Rawabi Archer Company Ltd. company, reflecting its scale as a Oil and Gas.

Neither Rawabi Archer Company Ltd. nor Amec Foster Wheeler holds SOC 2 Type 1 certification.

Neither Rawabi Archer Company Ltd. nor Amec Foster Wheeler holds SOC 2 Type 2 certification.

Neither Rawabi Archer Company Ltd. nor Amec Foster Wheeler holds ISO 27001 certification.

Neither Rawabi Archer Company Ltd. nor Amec Foster Wheeler holds PCI DSS certification.

Neither Rawabi Archer Company Ltd. nor Amec Foster Wheeler holds HIPAA certification.

Neither Rawabi Archer Company Ltd. nor Amec Foster Wheeler holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

nimiq/core-rs-albatross is a Rust implementation of the Nimiq Proof-of-Stake protocol based on the Albatross consensus algorithm. Prior to version 1.3.0, two peer-facing consensus request handlers assume that the history index is always available and call blockchain.history_store.history_index().unwrap() directly. That assumption is false by construction. HistoryStoreProxy::history_index() explicitly returns None for the valid HistoryStoreProxy::WithoutIndex state. when a full node is syncing or otherwise running without the history index, a remote peer can send RequestTransactionsProof or RequestTransactionReceiptsByAddress and trigger an Option::unwrap() panic on the request path. This issue has been patched in version 1.3.0.

Risk Information
cvss3
Base: 5.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Description

PraisonAI is a multi-agent teams system. Prior to version 1.5.95, FileTools.download_file() in praisonaiagents validates the destination path but performs no validation on the url parameter, passing it directly to httpx.stream() with follow_redirects=True. An attacker who controls the URL can reach any host accessible from the server including cloud metadata services and internal network services. This issue has been patched in version 1.5.95.

Risk Information
cvss3
Base: 8.6
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
Description

PraisonAI is a multi-agent teams system. Prior to version 4.5.97, OAuthManager.validate_token() returns True for any token not found in its internal store, which is empty by default. Any HTTP request to the MCP server with an arbitrary Bearer token is treated as authenticated, granting full access to all registered tools and agent capabilities. This issue has been patched in version 4.5.97.

Risk Information
cvss3
Base: 9.1
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Description

PraisonAI is a multi-agent teams system. Prior to version 4.5.97, the PraisonAI Gateway server accepts WebSocket connections at /ws and serves agent topology at /info with no authentication. Any network client can connect, enumerate registered agents, and send arbitrary messages to agents and their tool sets. This issue has been patched in version 4.5.97.

Risk Information
cvss3
Base: 9.1
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Description

PraisonAI is a multi-agent teams system. Prior to version 4.5.90, MCPToolIndex.search_tools() compiles a caller-supplied string directly as a Python regular expression with no validation, sanitization, or timeout. A crafted regex causes catastrophic backtracking in the re engine, blocking the Python thread for hundreds of seconds and causing a complete service outage. This issue has been patched in version 4.5.90.

Risk Information
cvss3
Base: 6.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H